|Publication number||US7468663 B1|
|Application number||US 11/595,084|
|Publication date||Dec 23, 2008|
|Filing date||Nov 9, 2006|
|Priority date||Nov 9, 2006|
|Publication number||11595084, 595084, US 7468663 B1, US 7468663B1, US-B1-7468663, US7468663 B1, US7468663B1|
|Inventors||Michael J. Rufolo, Jr., Michael J. Shannon|
|Original Assignee||Rufolo Jr Michael J, Shannon Michael J|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (2), Referenced by (7), Classifications (14), Legal Events (1)|
|External Links: USPTO, USPTO Assignment, Espacenet|
The present invention relates to the field of security systems, and more particularly to security systems having internal audio and video communication equipment.
It has become too common that an armed individual enters a school or other building and threatens or injures occupants. The individual is often an outsider, as in the case of the Amish school incident, or a school student, as in the Columbine killings. This problem occurs also in offices, banks, and many other public or semi-public buildings. Public buildings such as courthouses have installed metal detectors and posted guards. Many larger schools have hired guards or actual police. These security measures have been somewhat effective, but those who are sufficiently motivated or deranged tend to find ways to circumvent the gatekeeping protections.
Once an incident has begun, the security personnel or police that arrive are unaware of the details of the situation within the facility. This lack of current information hinders resolution, since the police or security may not know the number of intruders, type and number of weapons, and the actual conditions. Attempts to negotiate with the intruder and bargain a solution are critical. This can only be helpful if a communication link is accessible. When the threat occurs in a school building, direct communication with a specific room is often not available, and broadcasting negotiations to multiple rooms is likely to add panic to the situation.
The building security system of the present invention relates to any public or semi-public building. A security station connects each room, e.g. classroom, via a router to a computer. Each room and hall contains a visible camera and a second camera that is hidden from view. Each room and hall also has a door that may be locked from a remote location to prevent threatening intruders from exiting the room. Each room has a portable signaling device, preferably carried by room personnel, i.e. a teacher, by which a signal may be sent manually or automatically in case the teacher falls. The signal alerts security personnel who confirm the existence of a threat and contact police. The police are able to obtain audio and video information of the endangered room through the computer and communicate with the intruders.
The present invention is best understood in conjunction with the accompanying drawing figures in which like elements are identified by similar reference numerals and wherein:
Referring now to
Each classroom B-F is similarly equipped. Referring now to endangered classroom E, a first camera 18 is mounted in plain view in a location from which a view can be taken of the major portion of classroom E. Camera 18 is a closed circuit television (CCTV) camera that is either hard wired or wireless, as is known. Whereas security cameras are well known and an intruder intent on causing a threat or injury could incapacitate camera 18, a second camera 40 is mounted at a second location. Second camera 40 is mounted in a manner to be virtually invisible, for example within a wall-mounted clock, a hung picture, or within the wall structure. Hidden camera 40 is also a CCTV type and either wired or wireless. In each of classrooms B-F, hidden cameras 34-42 are illustrated as being encased in an obscuring elliptical housing. The presence of a hidden camera 40 ensures a view of the endangered area independent of the visible camera. Security station A contains a router 50 to which all cameras and other audio and video equipment are connected. Router 50 may be wired or wireless, or a combination of both, depending on the needs of the system being used. A computer 54 is also located in security station A and in operative communication with router 50 for recording of video and audio data and for communication with external devices. Router 50 and computer 54 operate cooperatively as a communication center, enabling transmission of audio and video with each of classrooms B-F as well as hallways G and H. Visible camera 18 and hidden camera 40 operate independently to capture situations in classroom E, and are viewed on receipt of a signal, or randomly during the course of the day. Security station A is equipped with visible camera 10 as well as hidden camera 32 to provide a view for police of this area.
Returning to classroom E, a signaling device 66 is available to personnel, e.g. a teacher. Signaling device 66 is preferably wireless and secretly worn by the teacher in order to enable an emergency signal from any location in classroom E. Signaling device 66 is adapted with a level sensor to automatically generate a signal should the teacher wearing signaling device 66 fall to the floor, causing the level sensor to change from a vertical orientation to a horizontal orientation. When a signal is generated by signaling device 66, either by intentional contact or by the teacher falling, the signal is transmitted to security station A where security personnel are alerted. On the possibility that the teacher may fall due to tripping or other non-threatening event, signaling device 66 includes a delay in the level sensor circuit before activating a signal. The security personnel will first use computer 54 to display the scene from one or both of visible camera 18 and hidden camera 40 to determine the nature of the situation. Computer 54 is programmed with software for simplified viewing of classroom camera images and communication to a single classroom or multiple classrooms as well as the remote controlling of classroom locks. A building security person or an outside police officer is thus able to readily view and respond to a problem by clicking a menu tab displayed on the screen. If the situation warrants, for example an armed intruder in the signaling classroom, a further signal is transmitted by secure linkage to a local police station. The security personnel would then scan other classrooms B-F and hallways G and H to determine the extent of the situation. Police cars today are equipped with laptop computers that can communicate with computer 54 in security station A. Other wireless communication devices, such as a Blackberry®, are also usable. Police or other appropriate authorities are provided with a secure password to be used in order to remotely connect to computer 54 and view the building plan, the location of the endangered classroom and the transmitted pictures from various cameras. Police will also be able to communicate by VOIP (voice over internet protocol) link through computer 54 to endangered classroom E or other areas in the building. Displaying to security personnel and police the actual situation in the endangered area, how many intruders, whether the intruders are armed, type and mannerism of intruders, helps to eliminate police guesswork therefore improving the chance of a successful resolution. All audio or video communications are handled by router 50, whether to computer 54 or directly to a classroom. The system capability of allowing security personnel or police to speak directly with the intruders, rather than through a phone that may not be available or functioning, improves the quality of communication and also the resolution of the situation.
Classroom E is equipped with a remotely controlled lockable door 82. Door 82 may be remotely locked to prevent an intruder from entering classroom E. In addition, an intruder can be confined to hallway G after locking door 82 and outer door 86. All door locks 74-86 are controlled through computer 54, either from security station A or from a police communication device. It is preferred that door 74 of security station A remain generally locked because of the special importance of this area. All classrooms B-F have similar cameras, remotely lockable doors and portable signaling devices as described in relation to classroom E.
Referring now to
While the description above discloses preferred embodiments of the present invention, it is contemplated that numerous variations and modifications of the invention are possible and are considered to be within the scope of the claims that follow. Further, the description of the invention in the context of a school is presented as a preferred embodiment and not as a limitation, it being understood that the invention has application to buildings of various functions.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5990938 *||Feb 26, 1997||Nov 23, 1999||Bern; Brett L.||Showcase security system|
|US20030061621 *||Sep 26, 2001||Mar 27, 2003||Micro Technology Services, Inc.||Transportable LAN-based surveillance system|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US8615438 *||Jan 14, 2010||Dec 24, 2013||Visa International Service Association||Time-dependent response to user-determined unauthorized transaction|
|US20100274679 *||Jan 14, 2010||Oct 28, 2010||Ayman Hammad||Fraud location determination|
|US20100315508 *||Dec 16, 2010||Hon Hai Precision Industry Co., Ltd.||Video monitoring system and method|
|US20110309910 *||Dec 18, 2009||Dec 22, 2011||Lee Young Bum||Security document control system and control method thereof|
|US20130141239 *||Dec 2, 2011||Jun 6, 2013||Robert Bosch Gmbh||Method of Using Spring GPS Data to Supplement Location Data in a Surveillance System|
|US20150170486 *||Dec 12, 2013||Jun 18, 2015||Rustin B. Penland||Security system for identifying disturbances in a building|
|WO2011151829A2 *||Jun 1, 2011||Dec 8, 2011||Itay Novik||Toilet facility system|
|U.S. Classification||340/541, 340/540, 348/370, 348/160, 348/377, 340/571, 348/143|
|Cooperative Classification||G08B13/19641, G08B15/001, G08B13/19645|
|European Classification||G08B15/00C, G08B13/196L2, G08B13/196L1|